Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis Saleem, Shahzad
2016
16 S p. S55-S64
10 p.
article
2 Authorship verification for different languages, genres and topics Halvani, Oren
2016
16 S p. S33-S43
11 p.
article
3 Automatic profile generation for live Linux Memory analysis Socała, Arkadiusz
2016
16 S p. S11-S24
14 p.
article
4 Digital evidence, ‘absence’ of data and ambiguous patterns of reasoning Biedermann, Alex
2016
16 S p. S86-S95
10 p.
article
5 Evaluating atomicity, and integrity of correct memory acquisition methods Gruhn, Michael
2016
16 S p. S1-S10
10 p.
article
6 Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history Gresty, David W.
2016
16 S p. S124-S133
10 p.
article
7 Forensic analysis of cloud-native artifacts Roussev, Vassil
2016
16 S p. S104-S113
10 p.
article
8 Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis Al Mutawa, Noora
2016
16 S p. S96-S103
8 p.
article
9 Generic RAID reassembly using block-level entropy Zoubek, Christian
2016
16 S p. S44-S54
11 p.
article
10 Lest we forget: Cold-boot attacks on scrambled DDR3 memory Bauer, Johannes
2016
16 S p. S65-S74
10 p.
article
11 Pool tag quick scanning for windows memory analysis Sylve, Joe T.
2016
16 S p. S25-S32
8 p.
article
12 Prelim i - Editorial Board 2016
16 S p. i-
1 p.
article
13 Prelim iii - Contents List 2016
16 S p. iii-
1 p.
article
14 Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists Hitchcock, Ben
2016
16 S p. S75-S85
11 p.
article
15 TLSkex: Harnessing virtual machine introspection for decrypting TLS communication Taubmann, Benjamin
2016
16 S p. S114-S123
10 p.
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands